In the Linux kernel, the following vulnerability has been resolved:
scsi: lpfc: Check kzalloc() in lpfcsli4cgnparamsread()
If kzalloc() fails in lpfcsli4cgnparamsread(), then we rely on lpfcreadobject()'s routine to NULL check pdata.
Currently, an early return error is thrown from lpfcreadobject() to protect us from NULL ptr dereference, but the errno code is -ENODEV.
Change the errno code to a more appropriate -ENOMEM.
{ "vanir_signatures": [ { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/scsi/lpfc/lpfc_sli.c", "function": "lpfc_read_object" }, "deprecated": false, "digest": { "length": 2763.0, "function_hash": "157543472591741193417656291001276803265" }, "id": "CVE-2023-53038-05d73682", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4829a1e1171536978b240a1438789c2e4d5c9715" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/scsi/lpfc/lpfc_init.c", "function": "lpfc_sli4_cgn_params_read" }, "deprecated": false, "digest": { "length": 626.0, "function_hash": "157866085601578523644910178501991435638" }, "id": "CVE-2023-53038-633cbe1f", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4829a1e1171536978b240a1438789c2e4d5c9715" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "drivers/scsi/lpfc/lpfc_sli.c" }, "deprecated": false, "digest": { "line_hashes": [ "118241733523553496533230341904827137761", "138438536202536941059405257734576879370", "157956426404106343641348520014571746450", "242255350287769981869560759001787375047", "93821805221070025575506384945017357064" ], "threshold": 0.9 }, "id": "CVE-2023-53038-6b94e21b", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@908dd9a0853a88155a5a36018c7e2b32ccf20379" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "drivers/scsi/lpfc/lpfc_init.c" }, "deprecated": false, "digest": { "line_hashes": [ "84688518408774097071533114576215089000", "166493413087846399249476444885608516260", "61059276939624006084730732093584152425", "85413132113588431148493112176587770916" ], "threshold": 0.9 }, "id": "CVE-2023-53038-95bf45bc", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@908dd9a0853a88155a5a36018c7e2b32ccf20379" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "drivers/scsi/lpfc/lpfc_init.c" }, "deprecated": false, "digest": { "line_hashes": [ "84688518408774097071533114576215089000", "166493413087846399249476444885608516260", "61059276939624006084730732093584152425", "85413132113588431148493112176587770916" ], "threshold": 0.9 }, "id": "CVE-2023-53038-9606f49b", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@312320b0e0ec21249a17645683fe5304d796aec1" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "drivers/scsi/lpfc/lpfc_init.c" }, "deprecated": false, "digest": { "line_hashes": [ "84688518408774097071533114576215089000", "166493413087846399249476444885608516260", "61059276939624006084730732093584152425", "85413132113588431148493112176587770916" ], "threshold": 0.9 }, "id": "CVE-2023-53038-9eda95ff", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4829a1e1171536978b240a1438789c2e4d5c9715" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/scsi/lpfc/lpfc_sli.c", "function": "lpfc_read_object" }, "deprecated": false, "digest": { "length": 2763.0, "function_hash": "157543472591741193417656291001276803265" }, "id": "CVE-2023-53038-ac6214b2", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@312320b0e0ec21249a17645683fe5304d796aec1" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/scsi/lpfc/lpfc_init.c", "function": "lpfc_sli4_cgn_params_read" }, "deprecated": false, "digest": { "length": 626.0, "function_hash": "157866085601578523644910178501991435638" }, "id": "CVE-2023-53038-b108265a", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@312320b0e0ec21249a17645683fe5304d796aec1" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/scsi/lpfc/lpfc_init.c", "function": "lpfc_sli4_cgn_params_read" }, "deprecated": false, "digest": { "length": 626.0, "function_hash": "157866085601578523644910178501991435638" }, "id": "CVE-2023-53038-b453bab1", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@908dd9a0853a88155a5a36018c7e2b32ccf20379" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "drivers/scsi/lpfc/lpfc_sli.c" }, "deprecated": false, "digest": { "line_hashes": [ "118241733523553496533230341904827137761", "138438536202536941059405257734576879370", "157956426404106343641348520014571746450", "242255350287769981869560759001787375047", "93821805221070025575506384945017357064" ], "threshold": 0.9 }, "id": "CVE-2023-53038-b4dfed69", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@312320b0e0ec21249a17645683fe5304d796aec1" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "drivers/scsi/lpfc/lpfc_sli.c" }, "deprecated": false, "digest": { "line_hashes": [ "118241733523553496533230341904827137761", "138438536202536941059405257734576879370", "157956426404106343641348520014571746450", "242255350287769981869560759001787375047", "93821805221070025575506384945017357064" ], "threshold": 0.9 }, "id": "CVE-2023-53038-b7a57bea", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4829a1e1171536978b240a1438789c2e4d5c9715" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/scsi/lpfc/lpfc_sli.c", "function": "lpfc_read_object" }, "deprecated": false, "digest": { "length": 2763.0, "function_hash": "157543472591741193417656291001276803265" }, "id": "CVE-2023-53038-c378398b", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@908dd9a0853a88155a5a36018c7e2b32ccf20379" } ] }